vuln-list-alt/oval/p10/ALT-PU-2020-2313/definitions.json
2024-06-28 13:17:52 +00:00

305 lines
16 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202313",
"Version": "oval:org.altlinux.errata:def:20202313",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2313: package `asterisk` update to version 17.5.1-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2313",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2313",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-01086",
"RefURL": "https://bdu.fstec.ru/vul/2022-01086",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02186",
"RefURL": "https://bdu.fstec.ru/vul/2022-02186",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02209",
"RefURL": "https://bdu.fstec.ru/vul/2022-02209",
"Source": "BDU"
},
{
"RefID": "CVE-2019-15297",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15297",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15639",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15639",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18610",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18610",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18790",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18790",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37706",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37706",
"Source": "CVE"
},
{
"RefID": "CVE-2022-21723",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21723",
"Source": "CVE"
},
{
"RefID": "CVE-2022-23608",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-23608",
"Source": "CVE"
},
{
"RefID": "CVE-2022-26651",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26651",
"Source": "CVE"
},
{
"RefID": "CVE-2022-37325",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-37325",
"Source": "CVE"
},
{
"RefID": "CVE-2022-42705",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42705",
"Source": "CVE"
}
],
"Description": "This update upgrades asterisk to version 17.5.1-alt1. \nSecurity Fix(es):\n\n * BDU:2022-01086: Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с целочисленной потерей значимости, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02186: Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02209: Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2019-15297: res_pjsip_t38 in Sangoma Asterisk 15.x before 15.7.4 and 16.x before 16.5.1 allows an attacker to trigger a crash by sending a declined stream in a response to a T.38 re-invite initiated by Asterisk. The crash occurs because of a NULL session media object dereference.\n\n * CVE-2019-15639: main/translate.c in Sangoma Asterisk 13.28.0 and 16.5.0 allows a remote attacker to send a specific RTP packet during a call and cause a crash in a specific scenario.\n\n * CVE-2019-18610: An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.\n\n * CVE-2019-18790: An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport.\n\n * CVE-2021-37706: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victims network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victims machine. Users are advised to upgrade as soon as possible. There are no known workarounds.\n\n * CVE-2022-21723: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.\n\n * CVE-2022-23608: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.\n\n * CVE-2022-26651: An issue was discovered in Asterisk through 19.x and Certified Asterisk through 16.8-cert13. The func_odbc module provides possibly inadequate escaping functionality for backslash characters in SQL queries, resulting in user-provided data creating a broken SQL query or possibly a SQL injection. This is fixed in 16.25.2, 18.11.2, and 19.3.2, and 16.8-cert14.\n\n * CVE-2022-37325: In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and 19.x through 19.6.0, an incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can cause a crash.\n\n * CVE-2022-42705: A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-07-06"
},
"Updated": {
"Date": "2020-07-06"
},
"BDUs": [
{
"ID": "BDU:2022-01086",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-191",
"Href": "https://bdu.fstec.ru/vul/2022-01086",
"Impact": "High",
"Public": "20210810"
},
{
"ID": "BDU:2022-02186",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-02186",
"Impact": "Low",
"Public": "20220221"
},
{
"ID": "BDU:2022-02209",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-02209",
"Impact": "Critical",
"Public": "20220126"
}
],
"CVEs": [
{
"ID": "CVE-2019-15297",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15297",
"Impact": "Low",
"Public": "20190909"
},
{
"ID": "CVE-2019-15639",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15639",
"Impact": "High",
"Public": "20190909"
},
{
"ID": "CVE-2019-18610",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18610",
"Impact": "High",
"Public": "20191122"
},
{
"ID": "CVE-2019-18790",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18790",
"Impact": "Low",
"Public": "20191122"
},
{
"ID": "CVE-2021-37706",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-191",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37706",
"Impact": "Critical",
"Public": "20211222"
},
{
"ID": "CVE-2022-21723",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21723",
"Impact": "Critical",
"Public": "20220127"
},
{
"ID": "CVE-2022-23608",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-23608",
"Impact": "Critical",
"Public": "20220222"
},
{
"ID": "CVE-2022-26651",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26651",
"Impact": "Critical",
"Public": "20220415"
},
{
"ID": "CVE-2022-37325",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-37325",
"Impact": "High",
"Public": "20221205"
},
{
"ID": "CVE-2022-42705",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42705",
"Impact": "Low",
"Public": "20221205"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202313001",
"Comment": "asterisk is earlier than 0:17.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202313002",
"Comment": "asterisk-devel is earlier than 0:17.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202313003",
"Comment": "asterisk-jabber is earlier than 0:17.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202313004",
"Comment": "asterisk-ldap is earlier than 0:17.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202313005",
"Comment": "asterisk-odbc is earlier than 0:17.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202313006",
"Comment": "asterisk-pgsql is earlier than 0:17.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202313007",
"Comment": "asterisk-radius is earlier than 0:17.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202313008",
"Comment": "asterisk-snmp is earlier than 0:17.5.1-alt1"
}
]
}
]
}
}
]
}